default search action
Computer and Network Security Essentials, 2018
- Kevin Daimi:
Computer and Network Security Essentials. Springer 2018, ISBN 978-3-319-58423-2
Computer Security
- Jeffrey L. Duffany:
Computer Security. 3-20 - Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer:
A Survey and Taxonomy of Classifiers of Intrusion Detection Systems. 21-39 - Gregory Vert, Ann Leslie Claesson-Vert, Jesse Roberts, Erica Bott:
A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics. 41-64 - Sally Mosaad, Nashwa Abdelbaki, Ahmed F. Shosha:
A Postmortem Forensic Analysis for a JavaScript Based Attack. 79-94
Network Security
- Keyur Parmar, Devesh C. Jinwala:
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks. 97-111 - Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer:
A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems. 113-134 - José María de Fuentes, Luis Hernández Encinas, Arturo Ribagorda:
Security Protocols for Networks and Internet: A Global Vision. 135-151 - Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, Leszek Lilien:
Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls. 153-172 - Xiujuan Du, Meiju Li, Keqin Li:
Reliable Transmission Protocol for Underwater Acoustic Networks. 173-187 - Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft:
Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield. 189-204
Cryptographic Technologies
- Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh:
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study. 207-219 - Khaled Abdul-Aziz Al-Utaibi, El-Sayed M. El-Alfy:
Searching Encrypted Data on the Cloud. 221-236 - Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj:
A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services. 237-261 - Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernández Encinas, David Arroyo:
Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers. 263-281 - Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz:
Secure Elliptic Curves in Cryptography. 283-298 - Ángel Martín del Rey, Alberto Peinado:
Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis. 299-313
Biometrics and Forensics
- Natarajan Meghanathan:
Biometric Systems for User Authentication. 317-335 - Giovanni Luca Masala, Pietro Ruiu, Enrico Grosso:
Biometric Authentication and Data Security in Cloud Computing. 337-353 - Slobodan Petrovic:
Approximate Search in Digital Forensics. 355-367 - Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac:
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar. 369-388
Hardware Security
- Mohamed T. Abdelazim, Nashwa Abdelbaki, Ahmed F. Shosha:
Experimental Digital Forensics of Subscriber Identification Module (SIM) Card. 391-405 - Fathi Amsaad, Nitin Pundir, Mohammed Y. Niamat:
A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks. 407-425 - Ioannis Papakonstantinou, Nicolas Sklavos:
Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs. 427-442
Security Applications
- Pascal Birnstill, Christoph Bier, Paul Georg Wagner, Jürgen Beyerer:
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking. 445-460 - Elias Bou-Harb, Claude Fachkha:
On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns. 461-474 - Natarajan Meghanathan, Michael Terrell:
Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment. 475-490
Security Management
- Bryson R. Payne, Tamirat T. Abegaz:
Securing the Internet of Things: Best Practices for Deploying IoT Devices. 493-506 - Sana Siddiqui, Muhammad Salman Khan, Ken Ferens:
Cognitive Computing and Multiscale Analysis for Cyber Security. 507-519 - Jaedeok Kim, Guillermo A. Francia III:
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems. 521-538 - Polyxeni Spanaki, Nicolas Sklavos:
Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts. 539-553 - Jason B. Ernst, Tarfa Hamed, Stefan C. Kremer:
A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems. 555-568 - Thiago Gomes Rodrigues, Patricia Takako Endo, David W. S. C. Beserra, Djamel Sadok, Judith Kelner:
Accountability for Federated Clouds. 569-583 - Muhammad Salman Khan, Sana Siddiqui, Ken Ferens:
A Cognitive and Concurrent Cyber Kill Chain Model. 585-602 - Jibran Saleem, Mohammad Hammoudeh:
Defense Methods Against Social Engineering Attacks. 603-618
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.